0zhu / maldet-modsecurity-vendor

Modsecurity Vendor created from https://www.rfxn.com/appdocs/README.maldetect

Home Page:https://zhubanruban.github.io/maldet-modsecurity-vendor/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Maldet Modsecurity Vendor

Sources

12th paragraph [ MODSECURITY2 UPLOAD SCANNING ] of maldetect README

How to Create a ModSecurity Vendor

Installation

WHM

Instructions

Vendor Configuration URL: https://github.com/zhubanRuban/maldet-modsecurity-vendor/raw/master/meta_maldet.yaml

Command line

/scripts/modsec_vendor add https://github.com/zhubanRuban/maldet-modsecurity-vendor/raw/master/meta_maldet.yaml

Custom Maldet ignore_inotify file

Installation

wget -O /usr/local/maldetect/ignore_inotify https://github.com/zhubanRuban/maldet-modsecurity-vendor/raw/master/custom_ignore_inotify
service maldet restart

Why

cPanel with MariaDB creates temp files with MAD and MAI extensions which are not covered by current rules:

^/var/tmp/#sql_.*\.MYD$
^/tmp/#sql_.*\.MYD$

so replaced with:

^/var/tmp/#sql_.*
^/tmp/#sql_.*
^/dev/shm/#sql_.*

About

Modsecurity Vendor created from https://www.rfxn.com/appdocs/README.maldetect

https://zhubanruban.github.io/maldet-modsecurity-vendor/


Languages

Language:Shell 100.0%